ISSWorld Asia. Intelligence Support Systems for Lawful Interception, Electronic Surveillance and Cyber Intelligence Gathering



Similar documents
ISSWorld Latin America

Intelligence Support Systems for Lawful Interception, Electronic Surveillance and Cyber Intelligence Gathering JULY 2016 JOHANNESBURG, ZA

Intelligence Support Systems for Lawful Interception, Electronic Surveillance and Cyber Intelligence Gathering

How To Use The Internet For Intelligence

Governmental Security Solutions. Elaman The bridge to Trust and Security

WHITE PAPER. Gaining Total Visibility for Lawful Interception

Applying machine learning techniques to achieve resilient, accurate, high-speed malware detection

Enterprise Network Security Classes

WHITE PAPER. Managed Security. Five Reasons to Adopt a Managed Security Service

IMPLEMENTING A SECURITY ANALYTICS ARCHITECTURE

CC5500 Interceptor HSS DEVELOPMENT INC. HSS Development Inc. 75S Broadway White Plains, NY Tel: Fax:

t/erint en z en CD a: "'- c. ea Q) 0 ~ ~ Q) ea '(3 POWERING ACTIONABLE INTELLIGENCE ~~~> ~ - "'0 s:::: LL. ea (.) (ij.s:::: "'- :t: Q) ea 'E

IBM Technology in Public Safety

Whitepaper on AuthShield Two Factor Authentication and Access integration with Microsoft outlook using any Mail Exchange Servers

NICE Systems and Avaya provide businesses with Insight from Interactions

Who Drives Cybersecurity in Your Business? Milan Patel, K2 Intelligence. AIBA Quarterly Meeting September 10, 2015

KUDELSKI SECURITY DEFENSE.

VERINT Company Introduction. Gabriel Horowitz VP Sales Europe

Utimaco LIMS Access Points. Realtime Network Monitoring for Lawful Interception and Data Retention

ProtectWise: Shifting Network Security to the Cloud Date: March 2015 Author: Tony Palmer, Senior Lab Analyst and Aviv Kaufmann, Lab Analyst

WEBSENSE TRITON SOLUTIONS

Remote Forensic Software. Dr. Michael Thomas DigiTask GmbH, Germany

Top 10 Anti-fraud Tips: The Cybersecurity Breach Aftermath

RSA Adaptive Authentication For ecommerce

V ID E O A N A LYT ICS

About MicroSolved, Inc. Company Profile, Experience, Capabilities and Differentiators

Cyber Security Trends Market trends from leading security analysts and consultants at TÜV Rheinland, OpenSky, and OpenSky UK

Cloud Based Secure Web Gateway

Europol Cybercrime Centre. The perspective of Europol on Cybercrime. Courmayeur Mont Blanc, Italy, 2-4 December 2011

FINFISHER. it intrusion. Remote Monitoring & Infection Solutions FINSPY QUICK INFORMATION

The SIEM Evaluator s Guide

Digital Identity & Authentication Directions Biometric Applications Who is doing what? Academia, Industry, Government

Cisco Advanced Malware Protection for Endpoints

POLIWALL: AHEAD OF THE FIREWALL

INTRODUCING isheriff CLOUD SECURITY

Visualization, Modeling and Predictive Analysis of Internet Attacks. Thermopylae Sciences + Technology, LLC

Mobile Payments: The Market for Travelers, Unbanked, and No/Low Credit Users

POLIWALL: AHEAD OF THE FIREWALL

Why a Network-based Security Solution is Better than Using Point Solutions Architectures

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

Comprehensive real-time protection against Advanced Threats and data theft

Commercial Security Made Simple with Cloud Video Surveillance

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Privacy Policy Version 1.0, 1 st of May 2016

Cybersecurity Delivering Confidence in the Cyber Domain

Cisco RSA Announcement Update

Advanced Threat Protection with Dell SecureWorks Security Services

Beyond the Hype: Advanced Persistent Threats

CHAPTER 3 : INCIDENT RESPONSE THREAT INTELLIGENCE GLOBAL THREAT INTELLIGENCE REPORT 2015 :: COPYRIGHT 2015 NTT INNOVATION INSTITUTE 1 LLC

submit your problem and we will be more than happy to cooperate with you to find the most effective solution.

2012 Data Breach Investigations Report

ONLINE AND MOBILE BANKING, YOUR RISKS COVERED

City Surveillance and the Cloud

Sophistication of attacks will keep improving, especially APT and zero-day exploits

Appendix A: Gap Analysis Spreadsheet. Competency and Skill List. Critical Thinking

Gregg Gerber. Strategic Engagement, Emerging Markets

Big Data in Telecom value chain. Presented by: Gurjot S Sandhu Director Sales Xalted Information Systems Pvt. Ltd.

IBM Australia. Integrated Network Security with IBM Global Technology Services

data driven government

A Forrester Consulting Thought Leadership Paper Commissioned By Zebra Technologies. November 2014

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

NATIONAL COST OF VoIP BYPASS

Why sample when you can monitor all network traffic inexpensively?

EAGLE EYE Wi-Fi. 1. Introduction

Cyber solutions for the fight against crime

Covert Operations: Kill Chain Actions using Security Analytics

Seamless Mobile Security for Network Operators. Build a secure foundation for winning new wireless services revenue.

Using LYNXeon with NetFlow to Complete Your Cyber Security Picture

場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :Jerry.Huang@rsa.com Sr. Technology Consultant GCR

One Minute in Cyber Security

Sourcefire Solutions Overview Security for the Real World. SEE everything in your environment. LEARN by applying security intelligence to data

Research Report Charging and Billing for the Digital Economy

Protect Your Online Footprint. HINTS & TIPS provided by MWR InfoSecurity and the Data Baby project

The partnership. The joint solution shifts wireless discussions to line-of-business and marketing needs, unlocking new revenue streams.

Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks

When to Leverage Video as a Platform A Guide to Optimizing the Retail Environment

2012 North American Managed Security Service Providers Growth Leadership Award

Cybersecurity Strategic Consulting

Wireless/Mobile Devices and Applications: Solutions and Market Opportunities

Always-On Real Estate Increasing the Value of Greenfield Real Estate Projects

Security Intelligence Services.

Global Network and Application Security Testing Market An Overview of Emerging Trends and Growth Opportunities For Test Solution Vendors

...the partnership. Purple WiFi is a cloud based WiFi and marketing analytics platform for bricks and mortar operations.

A Hurwitz white paper. Inventing the Future. Judith Hurwitz President and CEO. Sponsored by Hitachi

How Attackers are Targeting Your Mobile Devices. Wade Williamson

Information Security Basic Concepts

INTELLIGENT NETWORK SERVICES MIGRATION MORE VALUE FOR THE

Is backhaul the weak link in your LTE network? Network assurance strategies for LTE backhaul infrastructure

G DATA Mobile Malware Report

TRITON AP-WEB COMPREHENSIVE REAL-TIME PROTECTION AGAINST ADVANCED THREATS & DATA THEFT

An enterprise grade information security & forensic technical team

MANAGED SERVICES PROVIDER. Dynamic Solutions. Superior Results.

laroccasolutions Company Profile 2016 Experience & Innovation

Establishing a State Cyber Crimes Unit White Paper

2016 Outlook of the Global Security Industry

In this Profile. USA Tel: Fax:

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Practical Threat Intelligence. with Bromium LAVA

What is DECT? DECT stands for Digital Enhanced Cordless Telecommunications.

Transcription:

an Reg d 2 ist nd er 1 FR EE ISSWorld Asia Intelligence Support Systems for Lawful Interception, Electronic and Cyber Intelligence Gathering Where Law Enforcement, Public Safety, Telecoms and the Intelligence Community turn for Technical Training and Product Selection Lead Sponsor Exhibitors and Sponsors Associate Lead Sponsors 76 LEA/Interior Security/Intel Training Sessions and Courses to Choose From

ISSWorld Asia Intelligence Support Systems for Lawful Interception, Electronic and Cyber Intelligence Gathering ISS World Asia is the world's largest gathering of Asian Law Enforcement, Intelligence and Homeland Security Analysts as well as Telecom Operators responsible for Lawful Interception, Hi-Tech Electronic and Network Intelligence Gathering. ISS World Programs present the methodologies and tools for Law Enforcement, Communities in the fight against drug trafficking, cyber money laundering, human trafficking, terrorism and other criminal activities conducted over today's telecommunications network and the Internet. Track 1 Lawful Interception and Criminal Investigation Training Track 2 Big Data Analytics and Social Network Monitoring Training Track 3 Bitcoin, Blockchain, TOR and Dark Web Investigation Training Track 4 Encrypted Traffic Monitoring and IT Intrusion Product Training Track 5 LEA, Defense and Intelligence Analyst Product Demonstrations Track 6 Social Network Monitoring and Big Data Analytics Product Demonstrations Track 7 Mobile Signal Intercept and Electronic Product Demonstrations Seminars and Conference Training Sessions Seminar #1 08:30-17:00 Online Social Media and Internet Presented by Charles Cohen, Cohen Training and Consulting, LLC Charles Cohen also holds the position of Commander, Cyber Crimes Investigative Technologies Section, Indiana State Police, USA The Role of Online Social Media OSINT In Predicting and Interdicting Spree Killings: Case Studies and Analysis 9:45-10:45 OSINT and Criminal Metadata Exploitation in Criminal ISS World Asia Exhibit Hours: 10:00-17:00 9:30-12:30 EXIF Tags and Geolocation of Devices for and Operational Security Case Studies in Metadata Vulnerability Exploitation and Facial Recognition 16:00-17:00 What Investigators Need to Know About Emerging Technologies Used to Hide on the Internet Seminar #2 8:30-17:00 Practitioners Guide to Internet Presented by: Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police The aim of this 1 day seminar is to take the attendees from the basics of understanding the internet, how to find data, through to a full understanding of best practice of an internet investigator, having awareness and knowledge of all the tools available to achieve this. This is exclusively Law Enforcement only, as Practical examples, covert and investigative methods will be given throughout the seminar. The World Wide Web and the Internet 9:45-10:45 Recognizing Traffic Data WIFI and Mobile Data For Complete ISS World Conference Session Descriptions, Go To www.issworldtraining.com

ISSWorld Asia Intelligence Support Systems for Lawful Interception, Electronic and Cyber Intelligence Gathering Emerging Technologies, Masking Tech and Tools Advanced Techniques in Tracing Suspects 16:00-17:00 Open Source Intelligence Training (OSINT) Seminar #3 8:30-12:00 How Criminals and Terrorists Electronically Communicate Today and Available ISS Products for Interception and This half-day seminar covers how criminals and terrorists communicate over today s public telecommunications wireline and wireless networks, over the top Internet services and social networks. This seminar is ideal for law enforcement, interior security, public safety and others who need to understand the ISS technologies and products used to lawfully intercept electronic communications and conduct mass network surveillance as discussed at ISS World Conference sessions and by exhibitors. Introduction to Telecom Infrastructure and Related ISS Products for Interception and 9:45-10:45 Understanding Mobile Wireless Infrastructure, and Related ISS Products for Interception and Understanding the Internet Over-the-Top (OTT) Services and Related ISS Products for Interception and Seminar #4 Bitcoin 101: Introduction to Need to Know about Bitcoin Transactions, Dark Web Commerce and Blockchain Analysis This 101 training seminar is an introduction to Bitcoin, how the system is used to support criminal activities (e.g. Dark Web) and why technical investigators need to understand the basic Bitcoin transaction mechanism (Blockchain) to successfully defeat 21st century criminals and terrorist actions. Seminar #5 TOR and Dark Web Basics: How to Intercept TOR Communications This session covers how TOR is used to hide IP location of senders, HTTP log of files used and encrypt communications, TOR Hidden Services (Dark Web) and how to find Hidden Services and techniques for defeating TOR services as used by criminals terrorists. 8:15-8:30 Welcoming Remarks Tatiana Lucas, ISS World Program Director, 8:30-9:00 Top Ten Internet Challenges Facing Law Enforcement and the Intelligence Community and Who at ISS World Asia Has Solutions Dr. Jerry Lucas, President, Track 1 Lawful Interception and Criminal Investigation Training This track is for Telecom Operators and Law Enforcement/Intelligence/Defense Analysts who are responsible for specifying or developing lawful intercept network infrastructure. Zero In On Your Target: Advanced Social Engineering Techniques Presented by Hacking Team 11:30-12:00 About the Relevance of Lawful Interception and Data Retention in Modern Criminal Presented by Utimaco TS GmbH 12:00-12:30 Understanding the Challenge of Full VoLTE Visibility on 10/40/100G Interfaces in the Mobile Core Network Presented by Fiberblaze 13:30-14:00 Content Filtering A Technical Answer to Data Growth Presented by Utimaco TS GmbH 15:00-15:30 Enterprise-Level Intercept Technology for Edge Users Presented by Ultra Electronics, ProLogic

Track 2 Big Data Analytics and Social Network Monitoring Training This track is for Intelligence Analysts and Law Enforcement agents who have to connect the dots between people, places and other entities. 8:30-17:00 Online Social Media and Internet Charles Cohen, Cohen Training and Consulting, LLC 9:00-9:30 SIGINT, OSINT, HUMINT: Massive Data Fusion, Search & Analytics in 3 Clicks Presented by Advanced Systems 9:30-10:00 Multi-Source Intelligence Collection and Big Data Analytics Presented by Sinovatio Technology 11:30-12:00 High Consequence Cyber Crime (HC3) A New Perspective on Intelligence Presented by Wynyard Group Track 3 Bitcoin, Blockchain, TOR and Dark Web Investigation Training This track is for Criminal Investigators, Interior Security and Private Enterprise Investigators who have to understand Bitcoin, Blockchain, TOR and Dark Web Transactions. Bitcoin 101: Introduction to Need to Know About Bitcoin Transactions, Dark Web Commerce and Blockchain Analysis TOR and Dark Web Basics: What Investigators Need to Know to Defeat TOR Communications 13:30-17:15 Transitioning from Bitcoin to Next Generation Blockchain 2.0: Need To Know The difference between the Bitcoin Blockchain and Blockchain 2.0 Conceptual and technical explanation Overview of a crypto platform 2.0, live access and examples on how organized crime can use Blockchain 2.0 16:15-17:15 Covering tracks and keeping anonymity in Blockchain 2.0, Internet of things and Blockchain 3.0 overview Roberto Capodieci, CEO, Capodieci.com 8:30-13:00 Investigating Criminal Activities and Fraud Involving Bitcoin Blockchain and Blockchain 2.0: Need To Know Tips and tricks for LEAs when dealing with Blockchain 2.0 investigations How to collect collateral data What to look for during searches in cases that involve the use of blockchain 2.0 and 3.0 Difference between permanent data and data that change ownership (such as coins) 12:00-13:00 Confiscating values (currencies, assets, tokens, etc): best practices by a technical point of view Roberto Capodieci, CEO, Capodieci.com Track 4 Encrypted Traffic Monitoring and IT Intrusion Product Training This track is only open to Law Enforcement, Community Attendees Covert IT Operations with OSINT and FinFisher Real Scenarios Presented by FinFisher Encryption of Mass- Communication Changed the Game s Rules: Remote Stealth Presented by AGT Remote Exploitation of Smartphones and PCs Reality vs Marketing Presented by FinFisher Tactical IP Intercept for HTTPS Monitoring & Remote Intrusion Jitendra Verma, Director, Business Development, ClearTrail Technologies Encryption of Mass- Communication Changed the Game s Rules, Learn How to Stay Ahead of Remote Stealth Presented by AGT Solving the Impossible: A Live Demonstration of Unconventional Tools from Hacking Team Presented by Hacking Team

FinFisher: Maximum Impact The Evolution of IT Investigation Presented by FinFisher Track 5 LEA, Defense and Intelligence Analyst Training and Product Demonstrations This training is only open to Law Enforcement, Community Attendees. 8:30-17:00 Practitioners Guide to Internet Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK New Cutting-Edge Tools from Hacking Team Presented by Hacking Team VIBIS Voice Identification Based Interception System Presented by XSPec Technology 9:00-9:30 SESSION C Kidnapping-Providing Actionable Insight from CDR Data 9:30-10:00 Oil Theft Suspect Discovery Based on CDR Data Speeding Up Criminal How To Significantly Decrease Time Necessary To Identify Targets SESSION C Lawful Interception. Integrated Solution for Voice, Internet and Electronic. Presented by IPS 11:30-12:00 Clustering and Early Detection in : New Trends in Voice Biometrics Presented by Agnitio Combining Cyber HUMINT with Text Analytics to Identify Cyber Threats and Vulnerabilties Dr. Ori Sasson, PBM, Kofax Applying Instant Insight Security Analytics to Identify and Track Persons of Interest Presented by Glimmerglass Cyber Solutions 15:00-15:30 Second Phone Discovery An Event Based Analytical Approach 15:30-16:00 A Versatile Platform for Real time Monitoring 8:30-9:00 Kidnapping Providing Actionable Insight From CDR Data 9:00-9:30 Oil Theft Suspect Discovery Based on CDR Data Reduce Your IP Interception Cost Up To 50%. Know How? Jitendra Verma, Director Business Development, ClearTrail Technologies 10:30-11:00 SESSION C A versatile Platform for Real Time Monitoring Track 6 Social Network Monitoring and Big Data Analytics Training and Product Demonstrations This training is only open to Law Enforcement, Community Attendees. 9:45-10:15 OSINT Labs From an Empty Building to a Cornerstone of Any Intelligence Organization Mark P, Gamma Group The New Investigator Toolbox: from Tactical to Open Source Presented by AREA What OSINT Can Do Especially When Multilingual and Multimedial Mark P, Gamma Group 14:30-15:30 Deepinsight Demo: Experiential Solution of Intelligence Mining Presented by Sinovatio Technology 16:15-17:15 Virtual Human Intelligence: Be Inside, Stealth, Future and Technology Proof. Some Use Cases. Presented by AREA Facebook, Gmail, Skype, WhatsApp... Communication Goes Encrypted! Get Access to Encrypted Content in Minutes. Presented by IPS 12:00-13:00 Top 20 Open Source Tools (OSINT) Used in Cybercrime Mark Bentley, Communications Data Expert, National Cyber Crime Law Enforcement, UK Police Track 7 Mobile Signal Intercept and Electronic Training and Product Demonstration This track is only open to Law Enforcement, Community Attendees.

10:15-10:45 GPS Tracking and the M2M for Operations Paul Maguire, Gamma Group Covert Location Intelligence A New Paradigm In Intelligence Gathering Presented by Kommlabs NeoSoft Tactical Solutions for Mobile Monitoring Presented by NeoSoft High Accuracy Location Intelligence for Predicting and Preventing Crime Mahesh Patel, Chief Innovation Officer, Polaris Wireless Future Proofing COMINT Systems. Presented by EXFO Homeland Security Tactical and Strategic GSM- Monitoring/Covert Acquisition of GSM-Data Presented by Secure Information Management GmbH Precisely Locate Your Target in Half the Time Presented by Kommlabs Beyond Simple Phone Tracking Presented by Semptian Covert Intelligence Gathering Training: How To Enhance Your Intelligence Gathering Capabilities Presented by Providence 16:15-17:15 Command and Control Center for Tactical Operations with Audio, Video and GPS in a Strategic Vision Presented by IPS Nomadic Equipment, Wearable Monitoring and Field Command Centre Presented by AREA Utilizing Readily Available Cots Devices To Deliver a Robust Humint Collection Capability Paul Maguire, Gamma Group GSM/3G/LTE IMSI Catcher. Public Number Detection. Mass Emergency Notification by SMS. Presented by NeoSoft Mobile Phone Forensic, a New Way Presented by Secure Information Management GmbH Registration Information Save $300 by registering before 18 October, 2015 Telecommunications Service Provider or Government Registration ISS World Conference (Tracks 1 to 3), Pre-Conference Seminars and Exhibits...$995 Registration after 18 October 2015...$1,295 Law Enforcement/DHS/IC/DoD Registration* ISS World Conference (Tracks 1 to 3), Training Tracks 4, 5, 6 & 7 Pre-Conference Seminars plus Exhibits...$995 Registration after 18 October 2015...$1,295 Vendor Registration ISS World Conference (Tracks 1 to 3), Pre-Conference Seminars and Exhibits...$995 Registration after 18 October 2015...$1,295 *Note: To Attend the LEA/DHS/IC/DoD Training Tracks 4, 5, 6 & 7 you must be a sworn law enforcement officer or military/intelligence/government employee. Also you must register by 28 November 2015 in order to verify eligibility. Government photo ID required for Tracks 4, 5, 6 & 7 classroom access. Free Colleague Registration: Register as paid and you can invite a colleague to join you at ISS World Asia with a full, free conference pass. If you have not identified your guest at this time, just enter guest of followed by your name and complete with your contact information. You can register your guest at no charge at a later time. Conference and Exhibitions: Hilton Kuala Lumpur Hotel. Special ISS World early registration rate: $150 US per night. Telephone 60-3-2264-2264. International Attendees: If you need Visa assistance to attend ISS World, please contact Tatiana Lucas at talucas@telestrategies.com Conference by Invitation Only: To attend ISS World you must be a Telecommunications Service Provider, government employee, LEA or vendor with LI, surveillance or network products or services. If you have questions e-mail Tatiana Lucas at talucas@telestrategies.com. Registration Phone: 1-703-734-7050 Fax: 1-703-734-9371 Online: www.issworldtraining.com

ISSWorld Asia Lead and Associate Lead Sponsors Lead Sponsor trovicor is a worldwide leader providing turnkey lawful interception monitoring and intelligence solutions. Governments and law enforcement agencies around the globe turn to trovicor for advanced monitoring and analytical fusion systems to prevent crime and enhance safety and national security in accordance with their local laws. Leveraging our sophisticated knowledge of network technologies and operations, databases, call and IP data flows and ever-changing communication protocols and applications, our customers rely on our experience in the most advanced communication networks and environments. Using our extensive knowledge of the telecommunications and IT industry, we have designed the next generation Monitoring Center capable of recording and evaluating all target related communications in one central place, which can be linked to our advanced Intelligence Platform, enabling our customers to generate and analyse data and access valuable insights and reports. The result, actionable intelligence. Associate Lead Sponsors Founded in Berlin more than a decade ago, AGT is a leading security solutions provider with a strong consultancy focus and extensive system integration expertise. Our security competencies include: Social Media Open Source Investigation, Massive and Lawful Interception-the heart of our business, Digital Forensics including several national laboratories in the region, Data and Voice Encryption-up to national level projects. The projects were finalized in over a dozen countries in Europe, The Middle East and North Africa. AREA, is the Italian leading technology Industry and provider of Unconventional Communication and IP Info-Intelligence solutions.area provides an end to end Dual Use Info-Intelligence CC forhls/hld scenarios; satisfying Government Agencies need to securely and effectively gather precious information to contrast menaces to Citizen s security and prevent digital attacks. ClearTrail is leading provider of communication monitoring solutions to LEA s, Intelligence Agencies and Telecom carriers worldwide. Our solutions are deployed across hundreds of communication links and empower agencies to: Mass Intercept GSM/CDMA, PSTN, GPRS, EDGE, 3G/3.5G, Wi-Max, VSAT, & IP links; Monitor Wi-Fi networks and replay HTTPS sessions; Analyze vast amount of information and Remote intrusion and monitoring. Founded in 2008 Fiberblaze has rapidly grown to become a significant OEM supplier of FPGA based high performance Network Interface Cards for the Financial, Telecommunications and Cyber Security sectors. Our growth is fueled by our ability to provide solutions which match customer requirements, from unconfigured hardware platforms to fully configured solutions with focus on ultra-low latency and no loss data handling at full line rate. FinFisher solutions help government law enforcement and intelligence agencies to identify, locate and convict serious criminals. With innovative products, tailor-made solutions and end-to-end services FinFisher closes the gap in traditional investigative methods. Its portfolio allows governments to gain access to protected, offline information and relevant web-based communication channels. Gamma Group is an international manufacturer of surveillance & monitoring systems with technical and sales offices in Europe, Asia, the Middle East and Africa. We provide advanced technical surveillance, monitoring and Media Mining/OSINT solutions, advanced government training, as well as international consultancy to National and State Intelligence Departments and Law Enforcement Agencies. For 10 years Hacking Team has been helping law enforcement stop crime and terrorism. In an age of universal encryption, our technology gives government agencies the ability to see communications of suspects in the clear. The latest version, Galileo enables examination of the contents of endpoint devices and offers the widest selection of infection vectors available, all without protection systems being able to detect the investigation in progress. Find out more at www.hackingteam.com IPS is a leading global provider of Communication Intelligence solutions.the company develops the most complete Monitoring Centre and Network Monitoring platform for the LI market. After 25 years of market presence and more than 10 years in active fight against cybercrime, IPS can offer state-of-the-art technology for massive Interception enhanced with in-line features facing the HTTPS challenge in the Big Data environment. NeoSoft is a worldwide well-known manufacturer of security products based on cellular technologies GSM, 3G, LTE and CDMA used by Governments and Law Enforcement Agencies. Our worldwide known equipment is: GSM/3G Mobile Active Monitoring System, GSM Passive and Hybrid Monitoring Systems, CDMA Passive and Active Monitoring Systems, IMSI/IMEI GSM/UMTS/LTE Catcher, InPoint SMS System, GSM Communication System, Localization System, Solutions for Search & Rescue. Polaris Wireless is the global leader in providing high-accuracy, software-based wireless location solutions for wireless operators, law enforcement/government agencies and location-based application companies. Polaris Wireless is the recipient of the prestigious Frost & Sullivan 2011 and 2014 Enabling Technology of the Year award for its patented Wireless Location Signatures technology that uniquely enables accurate indoor, outdoor and vertical location and accurate mass location. Sinovatio is a leading global network security solutions provider which is founded in 2003. Based on our dedication to customer-centric innovation and strong partnerships, we have established end-to-end capabilities and strengths across the lawful interception, wireless locating, intelligence analysis, digital forensics, video surveillance, intelligent fencing, public opinion mining and other related fields. Our products and solutions have already been deployed in over 20 countries. Since 1994 Utimaco has been developing lawful interception and data retention systems for telecom operators and Internet service providers. Utimaco s carrier-grade systems enable real-time monitoring and long term data retention in public telecommunication networks. The systems interface with essentially all common network technologies and communications services. Utimaco is the preferred partner of many of the world s leading network equipment manufacturers. With around 250 installations in over 80 countries, Utimaco is a leading global supplier in the Lawful Interception and Data Retention market. Utimaco participates in LI standardization and supports international standardization institutes and telecom associations, such as, ETSI, 3GPP, ANSI/ATIS, and Bitkom. For more information visit www.utimaco.com